A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks

T Korakis, G Jakllari, L Tassiulas - … on Mobile ad hoc networking & …, 2003 - dl.acm.org
Directional antennas in ad hoc networks offer many benefits compared with classical
omnidirectional antennas. The most important include significant increase of spatial reuse, …

[PDF][PDF] Exploiting partially overlapping channels in wireless networks: Turning a peril into an advantage

A Mishra, E Rozner, S Banerjee… - Proceedings of the 5th …, 2005 - usenix.org
… are important to utilize the full capacity of a mesh network. Channel assignment affects the
… which utilizes a single wireless card to connect to multiple networks by constantly switching …

Empowering full-duplex wireless communication by exploiting directional diversity

E Everett, M Duarte, C Dick… - 2011 Conference record …, 2011 - ieeexplore.ieee.org
… in Figure 5(a) that full-duplex performs quite well when directionality is exploited and
both RF and digital cancellation are employed. At 10 m range full-duplex outperforms half-duplex …

Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks

JN Laneman, GW Wornell - IEEE Transactions on Information …, 2003 - ieeexplore.ieee.org
… multiple protocol layers in a wireless network. The protocols exploit spatial diversity available
among a … We demonstrate that these protocols achieve full spatial diversity in the number of …

Exploiting user demand diversity in heterogeneous wireless networks

Z Du, Q Wu, P Yang, Y Xu, J Wang… - … on Wireless …, 2015 - ieeexplore.ieee.org
wireless network with N networks coexisting in a given area. For simplicity, we use “network
to represent a cell in cellular networks … framework, full trust mode and partial trust mode. In …

Intelligent interference exploitation for heterogeneous cellular networks against eavesdropping

Y Zou - IEEE Journal on Selected Areas in Communications, 2018 - ieeexplore.ieee.org
… the perfect secrecy by taking full advantage of physical characteristics of wireless channels
[14]… and that of wiretap channel, which is severely degraded in wireless fading environments. …

Detecting selfish exploitation of carrier sensing in 802.11 networks

K Pelechrinis, G Yan, S Eidenbenz… - IEEE INFOCOM …, 2009 - ieeexplore.ieee.org
… the performance of Wireless LANs. However, CCA tuning can be exploited by selfish nodes
in … This full text paper was peer reviewed at the direction of IEEE Communications Society …

FDOE: Exploit concurrent communication opportunities in full-duplex wireless mesh networks

M Yu, A Tang, X Wang, J Liu - IEEE Transactions on Mobile …, 2022 - ieeexplore.ieee.org
… duplex can still achieve high throughput gain as long as fullduplex links can be efficiently …
fullduplex links to exploit concurrent transmission opportunities in a wireless mesh network. …

On the exploitation of CDF based wireless scheduling

U Ben-Porat, A Bremler-Barr, H Levy - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
… in wireless data networks by exploiting channel fluctuations. A highly desired property of
such a scheduling strategy is that its algorithm will be stable, in the sense that no user has …

Interference exploitation in full-duplex communications: Trading interference power for both uplink and downlink power savings

MT Kabir, MRA Khandaker… - … Transactions on Wireless …, 2018 - ieeexplore.ieee.org
… uplink interference cannot be exploited in the style of interference exploitation that we present
in … the proposed strategy in which we aim at exploiting the downlink interference power. …